General

  • Target

    920-55-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    9ea0356054ad53b7142fcb1395715665

  • SHA1

    60c0149fd923babf75f7b39fbb4869d5f999c837

  • SHA256

    c743a98c1f7ad182562ac0861a54b84cc28b86b21593c1b0a6ecaa2cafb12b83

  • SHA512

    5a08b0d21c5edf2c8ebf13ac51f25f1c4e1876af78f1baf5d1ecf8ecf3303efc63baf85ee06a0ca51e7c78997d32845cf802497963ec91d0784c582ded07e5d9

  • SSDEEP

    1536:raNcnVHT1O/oDuZeK+fbkmC0OKzFSnAhGjbpbV7HWOtqmsYgibfbFDKsRT:WNcZZiqDkmCv4KR9vCYgafJlT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM

C2

176.123.9.85:16482

Attributes
  • auth_value

    bd6ee094367c68799c2c63e5ee962328

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 920-55-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections